Story image

Growing IoT adoption putting Australians at risk of cyber attacks

22 May 18

IoT adoption in the Australian consumer market has grown 55% in the last year, bringing the total market worth to $583 million, according to a recent Telsyte Australian IoT@Home Market Study 2018.

But that increased adoption is putting Australians at increased risk of cyber attacks – and security is still often an afterthought for the manufacturers who make the devices.

Sense of Security CTO Jason Edelstein says manufacturers are pushing connected devices to the market in such a rush that the lack of security is putting Australians’ information at risk.

Telsyte’s research found that the average Australian household has 17.1 connected devices in 2018 and is forecast to reach 37 by 2022 – a total of 381 million connected devices across the country.

According to Edelstein, it’s not just households at risk – particularly as a range of commercial industries adopt IoT technologies.

“Due to the increased efficiencies and convenience IoT provides, it is permeating many industries, ranging from healthcare to retail. It could be an employee bringing in an unsecure IoT device and connecting it to the network. It could be a connected air-conditioning unit in the office. Or, worse, it could be a connected healthcare device that enables doctors to monitor a patient's condition remotely,” he says.

Edelstein notes that hackers have successfully broken into pacemakers, baby monitors, share bikes, and even a casino aquarium. Any device can become a gateway for hackers.

“What we find to be the most common vulnerabilities are software defects, bugs and logic flaws. This clearly shows we are rushing devices to market with little thought to how we protect the users. ”

“To address the security flaws, it is important we start bringing a cybersecurity mindset into the planning and design phase, particularly as more products continue to be connected to the internet.”

He also believes that organisations should continuously use penetration tests and application security reviews to monitor the security of new products.

However, organisations can often miss devices that would generally not be considered threats because IoT is so pervasive.

“There’s already been reports of connected vending machines or air conditioning units being used as back doors into the business network,” Edelstein says.

“For this, Red Teaming, the process of conducting a real-life cyber attack from an attacker's perspective, can help unveil secret entry points you may have missed.”

“Today, IoT devices are a hacker’s dream. It’s everywhere, it’s largely unsecure and it’s providing easy access points to conduct malicious activity and access sensitive information, such as medical records, addresses and credit card details. We must take a proactive approach to securing IoT or risk becoming an easy target."

Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
How to keep network infrastructure secure and available
Two OVH executives have weighed in on how network infrastructure and the challenges in that space will be evolving in the coming year.
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.